{"id":2944,"date":"2019-04-02T11:06:37","date_gmt":"2019-04-02T10:06:37","guid":{"rendered":"https:\/\/10.0.10.213\/?page_id=2944"},"modified":"2019-04-02T11:06:37","modified_gmt":"2019-04-02T10:06:37","slug":"besource","status":"publish","type":"page","link":"https:\/\/sertalink.com\/fr\/besource\/","title":{"rendered":"BeSource"},"content":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221;][et_pb_row admin_label=&#8221;row&#8221; make_fullwidth=&#8221;on&#8221; use_custom_width=&#8221;off&#8221; width_unit=&#8221;on&#8221; use_custom_gutter=&#8221;off&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/03\/Slider-background-texture-blue-1.jpg&#8221; allow_player_pause=&#8221;off&#8221; parallax=&#8221;off&#8221; parallax_method=&#8221;on&#8221; make_equal=&#8221;off&#8221; parallax_1=&#8221;off&#8221; parallax_method_1=&#8221;off&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; text_font_size=&#8221;56&#8243; text_text_color=&#8221;#ffffff&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>beSOURCE<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;center&#8221; text_font_size=&#8221;32&#8243; text_text_color=&#8221;#ffffff&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center;\">Static Code Security Analysis<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;36&#8243; text_text_color=&#8221;#55b4cc&#8221; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><strong>Integrate security into SDLC via potent code analysis<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;18&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p>Security must be an integral part of software development. Historically it hasn\u2019t been.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; text_line_height=&#8221;1.2em&#8221;]<\/p>\n<p>Static application security testing (SAST) used to be divorced from Code quality reviews, resulting in limited impact and value. beSOURCE addresses the code security quality of applications and thus integrates SecOps into DevOps.<\/p>\n<p>Other SAST offerings look at security as an isolated function. Beyond Security has turned this model upside-down by assuming the SecOps&#8217; perspective in addressing security from all possible angles.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;1_3&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;36&#8243; text_text_color=&#8221;#000000&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><strong>Security Standards<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;18&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p class=\"intro-text\">beSOURCE adheres to all pertinent standards, guiding static code analysis engine in providing an actionable reference point.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_line_height=&#8221;1.5em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<ul>\n<li>Common Weakness Enumeration (CWE)<\/li>\n<li>SANS TOP 25<\/li>\n<li>OWASP TOP 10<\/li>\n<li>CERT Secure Coding Guidelines<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;36&#8243; text_text_color=&#8221;#000000&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><strong>Easy to<br \/>\n<\/strong><strong>integrate<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;18&#8243; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p class=\"intro-text\">beSOURCE is designed to train the developer in easy and simple steps to achieve fast path to productivity.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_line_height=&#8221;1.5em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<ul>\n<li>Self-paced learning tools<\/li>\n<li>Intuitive wizard<\/li>\n<li>Simple set up and operation<\/li>\n<li>Logical and actionable reporting<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243;][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;4_4&#8243;][et_pb_video admin_label=&#8221;Video&#8221; src=&#8221;https:\/\/youtu.be\/XuK9dNK77Xc&#8221; \/][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;1_2&#8243;][et_pb_image admin_label=&#8221;Image&#8221; src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/Capture5.png&#8221; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; animation=&#8221;off&#8221; sticky=&#8221;off&#8221; align=&#8221;left&#8221; force_fullwidth=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; \/][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;18&#8243; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><strong>Merge code vulnerability analysis with software development<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;18&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p>Identify security vulnerabilities in source code during development to harden applications from the inside out.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-1 \">\n<div class=\"row-fluid \">\n<div class=\"span12 widget-span widget-type-cell main-content-wrapper section-pdg product-page light-grey-bg\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-2 \">\n<div class=\"row-fluid \">\n<div class=\"span12 widget-span widget-type-cell content-wrapper icon-with-content\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-3 \">\n<div class=\"row-fluid \">\n<div class=\"span6 widget-span widget-type-rich_text \" data-widget-type=\"rich_text\" data-x=\"6\" data-w=\"6\">\n<div class=\"cell-wrapper layout-widget-wrapper\">\n<p>Software applications are the power behind business productivity. They are also the most widely abused and breached resource within enterprises. beSOURCE detects high-risk software vulnerabilities, including SQL Injection, Buffer Overflows, Cross-Site Scripting, Cross-Site Request Forgery, in addition to the OWASP Top 10, SANS 25 and other standards used in the security industry.<\/p>\n<ul>\n<li>Provide vulnerability type and location (path, file name, line number)<\/li>\n<li>Secure coding guidelines (rule description, sample code and international standard references)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-4 \"><\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;1_2&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;18&#8243; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><strong>Get analysis done fast<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;18&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p>Test code security quickly and effectively.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-1 \">\n<div class=\"row-fluid \">\n<div class=\"span12 widget-span widget-type-cell main-content-wrapper section-pdg product-page light-grey-bg\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-2 \">\n<div class=\"row-fluid \">\n<div class=\"span12 widget-span widget-type-cell content-wrapper icon-with-content\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-3 \">\n<div class=\"row-fluid \">\n<div class=\"span6 widget-span widget-type-rich_text \" data-widget-type=\"rich_text\" data-x=\"6\" data-w=\"6\">\n<div class=\"cell-wrapper layout-widget-wrapper\">\n<div class=\"span6 widget-span widget-type-rich_text \" data-widget-type=\"rich_text\" data-x=\"0\" data-w=\"6\">\n<div class=\"cell-wrapper layout-widget-wrapper\">\n<p>By comprehensively testing of code against security programming best practices, prevent potential future breaches due to embedded application vulnerabilities. beSOURCE guides the developer by using an intuitive wizard which acts like a living coach throughout the SDLC. beSOURCE also offers:<\/p>\n<ul>\n<li>Exception filtering of vulnerability and flow trace to root-cause<\/li>\n<li>Clusters based on source file dependencies and analysis of them simultaneously with multiple threads<\/li>\n<li>Vulnerability status management and history maintenance of each vulnerability<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"text-center\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-4 \"><\/div>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243;][et_pb_image admin_label=&#8221;Image&#8221; src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/Capture6.png&#8221; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; animation=&#8221;off&#8221; sticky=&#8221;off&#8221; align=&#8221;left&#8221; force_fullwidth=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; \/][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Row&#8221;][et_pb_column type=&#8221;1_2&#8243;][et_pb_image admin_label=&#8221;Image&#8221; src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2019\/04\/Capture7.png&#8221; show_in_lightbox=&#8221;off&#8221; url_new_window=&#8221;off&#8221; use_overlay=&#8221;off&#8221; animation=&#8221;off&#8221; sticky=&#8221;off&#8221; align=&#8221;left&#8221; force_fullwidth=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221; \/][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243;][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_font_size=&#8221;18&#8243; text_text_color=&#8221;#000000&#8243; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<p><strong>Highly accurate code analysis<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Text&#8221; background_layout=&#8221;light&#8221; text_orientation=&#8221;left&#8221; text_line_height=&#8221;1.2em&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]<\/p>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-1 \">\n<div class=\"row-fluid \">\n<div class=\"span12 widget-span widget-type-cell main-content-wrapper section-pdg product-page light-grey-bg\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-2 \">\n<div class=\"row-fluid \">\n<div class=\"span12 widget-span widget-type-cell content-wrapper icon-with-content\" data-widget-type=\"cell\" data-x=\"0\" data-w=\"12\">\n<div class=\"row-fluid-wrapper row-depth-1 row-number-3 \">\n<div class=\"row-fluid \">\n<div class=\"span6 widget-span widget-type-rich_text \" data-widget-type=\"rich_text\" data-x=\"6\" data-w=\"6\">\n<div class=\"cell-wrapper layout-widget-wrapper\">\n<ul>\n<li>Pattern, type, flow and property analysis<\/li>\n<li>Path and context-sensitive analysis, Inter-procedural analysis<\/li>\n<li>Incremental analysis with on-demand code inspection<\/li>\n<li>Identifies hidden code security weaknesses<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-fluid-wrapper row-depth-1 row-number-4 \"><\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>beSOURCE Static Code Security Analysis Integrate security into SDLC via potent code analysis Security must be an integral part of software development. Historically it hasn\u2019t been. Static application security testing (SAST) used to be divorced from Code quality reviews, resulting in limited impact and value. beSOURCE addresses the code security quality of applications and thus [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-2944","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BeSource | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/fr\/besource\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BeSource | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/fr\/besource\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\",\"inLanguage\":\"fr-FR\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/fr\/besource\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/fr\/besource\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/fr\/#website\",\"url\":\"https:\/\/sertalink.com\/fr\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/fr\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/fr\/besource\/#webpage\",\"url\":\"https:\/\/sertalink.com\/fr\/besource\/\",\"name\":\"BeSource | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/fr\/#website\"},\"datePublished\":\"2019-04-02T10:06:37+00:00\",\"dateModified\":\"2019-04-02T10:06:37+00:00\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/fr\/besource\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/fr\/besource\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/fr\/besource\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgique\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/2944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/comments?post=2944"}],"version-history":[{"count":0,"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/pages\/2944\/revisions"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/fr\/wp-json\/wp\/v2\/media?parent=2944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}